Spectre and Meltdown are about as bad as vulnerabilities can get, offering significant security issues on a wide variety of processors with only a band aid solution currently available. It seems Intel is asking many clients to rip that band aid off as the supposed cure is now causing more widespread harm than the vulnerabilities it is to protect against. This is not a case of performance decreases due to the patch but instead, as Intel executive vice president Neil Shenoy puts it, the patch "may introduce higher than expected reboots and other unpredictable system behaviour." This means that not only new machines powered by Broadwell or Haswell are unprotected but also that many of your service providers will also not be installing these patches.
There is no good news out of this today, the difficulty a widespread attack is high but a targeted attack; not so much.
"We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior."
Here is some more Tech News from around the web:
- Linus Torvalds slams Intel's Spectre and Meltdown fixes as 'garbage' @ The Inquirer
- Uber shrugs off flaw that lets hackers bypass two-factor authentication @ The Inquirer
- Synology Surveillance Station: Home Security At Its Best @ Modders-Inc
- Stop Those Annoying Browser Prompts Asking for Your Location or to Send Notifications @ Techspot
- Nitro Concepts S300 Gaming Chair @ Kitguru
This is what happens when
This is what happens when MBAs and Marketing monkeys get hold of technology companies. All those billions wasted on Contra Revenue and partner support(bribes) and not much spent on securing the processor’s underlying CPU core hardware and other CPU core improvments. It’s been mostly little to no CPU micro-arch improvments at all with Intel relying on mostly process node shrinks. So look where that MBA/Marketing driven management focus has caused Intel to not deal with more security related CPU micro-arch related hardening in their CPU cores’ design over these many years.
So Let’s wait a while longer and force Intel to fix their entire core i series SKUs going back to the first generation and also force the laptop OEM’s to offer fireware updates going back all the way to the first generation Intel core i series SKUs for mobile/laptops. Force Intel to fund the laptop OEMs to fix the firmware/microcode all the way back to the firet core Intel core i series SKUs.
If Intel can spaff away 14+ Billion dollars on Contra Revenue then Intel can afford to fix the problem for all generations of core i series SOC/CPU SKUs.
^ This dude wishes he got his
^ This dude wishes he got his MBA. ^
How’s that Rebooting and
How’s that Rebooting and Rebooting going for your brain ya little Peckerwood! To many gererations of SisterLove in the family procreation history there Bubba webbed hands and feet!
^ This dude wishes he got his
^ This dude wishes he got his MBA. ^
How’s that Rebooting and
How’s that Rebooting and Rebooting going for your brain ya little Peckerwood! To many gererations of SisterLove in the family procreation history there Bubba webbed hands and feet!
Maybe it’s just me, but Intel
Maybe it’s just me, but Intel don’t have a fucking clue what’s wrong do they?
Oh they know whats
Oh they know whats wrong…..what they don’t have is any clue how to fix it and possibly can’t.